Security and Cryptography (S2, 2014)

Key Management and Distribution

Lecture Material




Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.

End-to-end vs Link Encryption Decentralised Secret Key Distribution 1 Decentralised Secret Key Distribution 2 Decentralised vs Centralised Key Distribution KDC Keys Known Before Exchange KDC Keys Known After Exchange Attack on KDC Key Exchange 1 Attack on KDC Key Exchange 2 Attack on KDC Key Exchange 3 Attack on KDC Key Exchange 4 Man-in-the-Middle Attack on Public Key Exchange Failed Attack on Public Key Based Secret Distribution Public Key Authority for Public Key Distribution Certificate Hierarchy or Chain

Return to: Course Home | Course List | Steven Gordon's Home | SIIT